Cyber Policy

Shifting the general European tone on the subject from secretive to open, the French Defense Secretary recently declared in a speech that “cyber war has begun” and that the country has added cyber capabilities to its arsenal that it is prepared to use proactively. The speech invites close collaboration between

“Predictions are hard, which is why Nextgov turned to industry leaders with a simple request: Give us your boldest prediction for federal IT. They dove into specific initiatives like the Defense Department’s Defense Enterprise Office Solutions contract and the General Service Administration’s Enterprise Infrastructure Solutions contract as well as the

With the closing of the 115th Congress, many technology bills remaining on the docket will be put out to pasture. Many of the new bills will likely be reintroduced in the next session, but others will likely not. Among the higher profile pieces of legislation that never landed on President

“President Donald Trump announced in a Dec. 23 tweet that Patrick Shanahan will become acting secretary of defense Jan. 1, replacing outgoing Pentagon chief Jim Mattis two months early. While it is not clear how long Shanahan will remain in the job, he is on the short list of officials

The new Democratic majority in Congress will likely have an impact on the continued development of cyber and tech policy. Areas that will likely see increased attention include privacy, oversight, and the new vacancy for the top Democrat place in the Senate’s Homeland Security Committee. Regarding privacy, the topic may

In a country, region, and continent beset with cybercrime and cyber vulnerabilities, a new “National School of Cybersecurity” has been launched in Dakar, Senegal. The school is the first of its kind on the continent and hopes to function as a “best-practice hub” for all of Africa. Expected to begin

Critics of the forthcoming Federal Data Strategy have faulted it for being unwieldy and overly difficult for end users to understand. According to one policy analyst, “the current draft has 47 practices organized around five objectives, 10 principles and six lifecycle steps. The result is an unwieldy three-dimensional framework that

“For months, top U.S. officials have warned that foreign countries, specifically Russia and China, have the capability to hack the American midterm elections. Fifth Domain is live-blogging election security updates before, during and after the Nov. 6 vote, following the efforts of the Department of Homeland Security and others to

A long series of state agencies and departments have been founded to secure U.S. programs, assets, and operations, but some experts are arguing that this has generated more confusion than security as the government has not worked to coordinate private sector capabilities. Problems of information sharing and overlapping agendas have

Due to the rate of change and development in cyber, army leaders in the area have argued that the U.S. Army must update its cyber doctrines more regularly. While Chief of Staff at CYBERCOM, Lt. Gen. Stephen Fogarty instructed the Cyber Center of Excellence to update its doctrine/cyber field manual